First published: Wed Nov 03 2021(Updated: )
Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=8.0.0<=8.1.2 | |
Apache Traffic Server | >=9.0.0<=9.1.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37147 is an improper input validation vulnerability in header parsing of Apache Traffic Server.
CVE-2021-37147 allows an attacker to smuggle requests, affecting Apache Traffic Server versions 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
CVE-2021-37147 has a severity score of 7.5, which is classified as high.
The remedy for CVE-2021-37147 on Debian Linux is to update to the specified versions: 8.0.2+ds-1+deb10u6, 8.1.7-0+deb10u2, 8.1.7+ds-1~deb11u1, 9.2.0+ds-2+deb12u1, or 9.2.2+ds-1.
Yes, you can find references for CVE-2021-37147 at the following links: [1] https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164, [2] https://www.debian.org/security/2022/dsa-5153, [3] https://www.openwall.com/lists/oss-security/2021/11/02/11.